Search Results - (( java implementation rsa algorithm ) OR ( knowledge making process algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin by Latiffah, A. Noor, Nordin, A. B.

    Published 2006
    “…This patterns or rules may help to develop better decision-making process. Data mining is primarily used in finance and business environment to extract knowledge from financial, retail, communication and marketing data. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…Cryptanalysis deals with the uncovering of encrypted messages without initial knowledge of the key used in the encryption process. …”
    Get full text
    Conference or Workshop Item
  9. 9

    Statistical fixed range multiple selection algorithm for peer-to-peer system by Kweh, Yeah Lun, Othman, Mohamed, Ahmad, Fatimah, Ibrahim, Hamidah

    Published 2010
    “…The algorithm uses a fixed filter range approach that has been defined before the process begin, in which the algorithm is able to make sure that the target key is within the specified filter range in each local file. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Disparity between theory & practice beyond the worst-case competitive analysis by Iqbal, Javeria, Ahmad, Iftikhar, Shah, Asadullah

    Published 2019
    “…For instance, in case of forex, the online algorithm is presented daily exchange rates. The algorithm does not have knowledge about future exchange rates, and has to make an irreversible conversion decision on each day. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12
  13. 13

    Machine learning using robust AI techniques / Prof. Madya Dr. Nordin Abu Bakar by Abu Bakar, Nordin (Prof. Madya Dr.)

    Published 2012
    “…The learning process creates knowledge that guides a person to make the decisions. …”
    Get full text
    Get full text
    Research Reports
  14. 14

    Static range multiple selection algorithm for peer-to-peer system by Othman, Mohamed, Kweh, Yeah Lun, Ahmad, Fatimah, Ibrahim, Hamidah

    Published 2011
    “…The algorithm uses a fixed filter approach in which the algorithm is able to make sure that the target key is within certain filter range in each local file. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A hybrid approach to improve recommendation system in E-tourism by Rahman M.M., Zaki Z.B.M., Alwi N.H.B.M., Monirul Islam M.

    Published 2024
    conference output::conference proceedings::conference paper
  16. 16

    DeMI interface tool for profit estimation and waste conversion technology recommendations in enhancing municipal solid waste management by Ali, R.A., Nik Ibrahim, N.N.L., Ghani, W.A.W.A.K., Sani, N.S., Lam, H.L.

    Published 2024
    “…This state-of-the-art tool seamlessly combines process network synthesis and machine learning, using the Process Graph (P-graph) and the Waikato Environment for Knowledge Analysis (WEKA) software tools. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    C4.5 Algorithm Application for Prediction of Self Candidate New Students in Higher Education by Erlan, Darmawan

    Published 2018
    “…But the abundant data has not been widely used in digging the information or knowledge that can help university management in making strategic plans. …”
    Get full text
    Get full text
    Journal
  18. 18

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…A support model enables negotiation process in group decision. Decision algorithms are based on the cooperative game theory to develop the agreement options and coalition formation. …”
    Get full text
    Get full text
    Article
  19. 19

    Decision tree as knowledge management tool in image classification by Kusrini, , Harjoko, Agus

    Published 2008
    “…Expert System has been grown so fast as a science that study how to make computer capable of solving problems that typically can only be solved by expert.It has been realized that the biggest challenge of developing expert system is the process include expert’s knowledge into the system.This research tries to model expert’s knowledge management using case based reasoning method.The knowledge itself is not inputted directly by the expert, but rather the system will learn the knowledge from what the expert did to the previous cases.This research takes image classification as the problem to be solved.As the knowledge development technique, we build decision tree by using C4.5 algorithm.Variables used for building the decision tree are the image visual features.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning by Noor, Ubair, Hassan, Raini, Dwi Handayani, Dini Oktarina

    Published 2025
    “…However, not much attention has been paid to issues related to skyline query processing over knowledge of large-scale incomplete graph databases. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper